Search

Your search keyword '"Gregory Epiphaniou"' showing total 202 results

Search Constraints

Start Over You searched for: Author "Gregory Epiphaniou" Remove constraint Author: "Gregory Epiphaniou"
202 results on '"Gregory Epiphaniou"'

Search Results

1. Quantum Key Distribution for V2I communications with software‐defined networking

2. Improving safety claims in digital health interventions using the digital health assessment method

3. Patients’ Perspectives on the Data Confidentiality, Privacy, and Security of mHealth Apps: Systematic Review

4. Patients and Stakeholders’ Perspectives Regarding the Privacy, Security, and Confidentiality of Data Collected via Mobile Health Apps in Saudi Arabia: Protocol for a Mixed Method Study

5. Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution

6. A Practical Implementation of Quantum-Derived Keys for Secure Vehicle-to-Infrastructure Communications

7. Pivot Attack Classification for Cyber Threat Intelligence

8. Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment

9. A Comprehensive Survey of Threats in Platooning—A Cloud-Assisted Connected and Autonomous Vehicle Application

10. A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites

11. A comparative cyber risk analysis between federated and self-sovereign identity management systems

12. Cyber-Physical Systems: Security Threats and Countermeasures

13. Security and Privacy in Connected Vehicle Cyber Physical System Using Zero Knowledge Succinct Non Interactive Argument of Knowledge over Blockchain

14. Preliminary Examination of Emergent Threat and Risk Landscapes in Intelligent Harvesting Robots

15. Do the Right Thing: A Privacy Policy Adherence Analysis of over Two Million Apps in Apple iOS App Store

16. A Resilient Cyber-Physical Demand Forecasting System for Critical Infrastructures against Stealthy False Data Injection Attacks

17. Safety, Security and Privacy in Machine Learning Based Internet of Things

19. Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study

20. A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments

21. Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems

25. A Way Forward for the MDCG 2019-16 Medical Device Security Guidance.

33. MedSecurance Project: Advanced Security-for-Safety Assurance for Medical Device IoT (IoMT).

Catalog

Books, media, physical & digital resources